CISO2CISO.COM & CYBER SECURITY GROUP
Skip to content
CISO2CISO.COM - From Cyber Technicals to C-Levels Cyber Advisors.
Twitter
Linkedin-in
Youtube
Rss
The Most Complete Reference & News Site For The Global Cyber Community.
CISO´s Notepad & Pappers Series
Cyber Security Stories & News
Cyber Security Attacks & Incidents
Malware & Ransomware
Vulnerabilities & Zero Days
About US
Account Login
LASTEST NEWS
04/06/2023 - 7:23 PM -
Strengthening The Canadian Financial Sector’s Cybersecurity – Source: securityboulevard.com
04/06/2023 - 7:23 PM -
Dancho Danchev’s OSINT and Threat Intelligence Training Video Demonstration in Bulgarian – Part Two – Source: securityboulevard.com
04/06/2023 - 7:23 PM -
Dancho Danchev’s OSINT and Threat Intelligence Training Video Demonstration in Bulgarian – Part One – Source: securityboulevard.com
04/06/2023 - 7:23 PM -
Technical Analysis of Bandit Stealer – Source: securityboulevard.com
04/06/2023 - 7:23 PM -
Using Cloud Securely — The Config Doom Question – Source: securityboulevard.com
04/06/2023 - 6:23 PM -
Microsoft Sets Aside $425M For Anticipated GDPR Fine – Source: www.databreachtoday.com
04/06/2023 - 4:23 PM -
Xplain hack impacted the Swiss cantonal police and Fedpol – Source: securityaffairs.com
04/06/2023 - 4:23 PM -
Zyxel published guidance for protecting devices from ongoing attacks – Source: securityaffairs.com
04/06/2023 - 4:23 PM -
Kimsuky APT poses as journalists and broadcast writers in its attacks – Source: securityaffairs.com
04/06/2023 - 10:23 AM -
API security in the spotlight – Week in security with Tony Anscombe – Source: www.welivesecurity.com
04/06/2023 - 1:23 AM -
Insider Q&A: Artificial Intelligence and Cybersecurity In Military Tech – Source: www.securityweek.com
04/06/2023 - 1:23 AM -
In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack – Source: www.securityweek.com
03/06/2023 - 11:24 PM -
Weekly Update 350 – Source: www.troyhunt.com
03/06/2023 - 10:24 PM -
Risk: Everything Everywhere All at Once – Source: www.cyberdefensemagazine.com
03/06/2023 - 9:19 PM -
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial airplane? by Marcos Jaimovich
03/06/2023 - 8:23 PM -
Microsoft Sets Aside $425M For Anticipated GDPR Fine – Source: www.govinfosecurity.com
03/06/2023 - 8:23 PM -
Hackers Using MOVEit Flaw to Deploy Web Shells, Steal Data – Source: www.govinfosecurity.com
03/06/2023 - 8:23 PM -
Chinese APT Backdoor Bypasses Indonesian Antivirus – Source: www.govinfosecurity.com
03/06/2023 - 7:23 PM -
The great CISO resignation: Why security leaders are quitting in droves – Source: www.proofpoint.com
03/06/2023 - 7:23 PM -
Online sellers targeted by new information-stealing malware campaign – Source: www.bleepingcomputer.com
Home
Pages: CISO2CISO Cyber Security Resources – CYBER SECURITY OPERATIONS & SOC
CYBER SECURITY OPERATIONS & SOC notepadS & resources
Marcos Jaimovich
Why do we compare a SOC (Security Operations Center) with the cockpit of a commercial...
not known
Threat Intelligence & Dark web Monitoring Tools
Logan Simpson
4 Steps to Building a Master Blue Team Home Lab by Logan Simpson
Rahmat Nurfauzi "@infosecn1nja"
Red Team Security Open Source Toolkit
Joas Antonio
Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio
TIDAL CYBER
The Ultimate Guide to CYBER THREAT Profiling by TIDAL CYBER
CYLANCE
Introduction to Artificial Intelligence for Security Professionals free e-book by the Cylance Data Science Team...
IZZMIER
Incident Response Playbooks & Workflows Ready for use in your SOC & Redteams
Kaspersky
Incident Response 2022 Report by Kaspersky
Purple Knight
2022 Purple Knight Report – Facing the Unknown – Uncoverging & Addressing Systemic Active Directory...
Security Boulevard
Complete Guide to Elastic SIEM – Source: securityboulevard.com
Forrester - Allie Mellen
Adapt Or Die: XDR Is On A Collision Course With SIEM And SOAR – EDR...
LOGPOINT
396 Use Cases & Siem Rules Code ready for use for Mitre Attacks Events Detection...
SANS DFIR
NEW TO DFIR – FIELD MANUAL – The Ultimate Guide Getting Started in Forensics &...
ISACA
ISACA Ransomware Incident Management Quick Reference Guide
Apress
Wireshark for Network Forensics – An Essential Guide for IT and Cloud Professionals by Nagendra...
Orange Cyberdefense
Orange Cyberdefense Security Navigator 2023 – Research-driven insights to build a safer digital society
Security TechRepublic
IBM launches QRadar Security Suite for accelerated threat detection and response – Source: www.techrepublic.com
Cyber Chief Magazine
Prevent Mallware with System Hardering – Strengthen Security by Cyber Chief Magazine
OAS
Practical Guide for CSIRTs by OAS – A Sustainable Business Model.
aws
Classic Intrusion Analysis Frameworks for AWS Environments: Application and Enhancement by AWS
Maddie Stone - Google
0-days Detected in-the-Wild in 2022 – Year in Review – Maddie Stone – Zer0Con 2023...
IGNITE Technologies
Incident Response Cheatsheet Windows & Linux by Hackingarticles.in – Ignite Technologies
Info-Tech Research Group
Best vendor agnostic SIEM for SOCs solution implementation guide by Info-Tech Research Group
osint - Open Source Intelligence
Awesome OSINT(Open-Source Intelligence) – Best curated list of amazingly awesome open source intelligence tools and...
cybereason
Ransomware and the Modern SOC – How Ransomware is Driving the Requirements for SOC Modernization...
CISA
2023 Top 26 Open Source Cyber Security Tools by CISA
SANS
SANS Faculty Cybersecurity Free Tools – SANS Instructors have built more than 150 open source...
MITRE
11 STRATEGIES OF A WORLD-CLASS CYBERSECURITY OPERATIONS CENTERS HIGHLIGHTS BY MITRE
BONI YEAMIN
OPEN SOURCE SOC TOOLS BY BONI YEAMIN
ARCTIC WOLF
Definitive Guide to SOC as a Service – The Essential Elements of Advanced Threat Detection...
APPLIED INCIDENT RESPONSE
Windows Event Security Log Analysis
Aristeidis Michail
Security Operations Center – A Business Perspective by Aristeidis Michail
Splunk
Five Automation Use Cases for Splunk SOAR by Splunk – Alert Enrichment , Phishing Investigation...
LUMU
The SOC of the Future by Jeffrey Wheat (Lumu`s CTO)
Marcos Jaimovich
Presentación “ModoSOC in Real Life” por Marcos Jaimovich en SEGURINFO Chile 2022.
CardinalOps
The State of SIEM Detection Risk 2022 Report – Quantifying the gaps in MITRE ATT&CK...
Microsoft & CyberProof
A Complete Guide to Modernizing your Security Operations Centers (SOCs) by Microsoft and CyberProof
CSO Online
7 Best Reasons to be a CISO by Michaell Hill UK Editor CSO
CISO2CISO.COM
SOC Analyst Interview Questions
IST RANSOM TASKFORCE
Blueprint for Ransomware Defense – An Action Plan for Ransomware Mitigation , Response and Recovery...
Paul Agbabian
Undestanding the Open Cybersecurity Schema Framework by Paul Agbabian.
Splunk
The Transformational CISOs Guide to Security Orchestration, Automation and Response – How giving security teams...
CISCO TALOS
Cisco Talos shares insights related to recent cyber attack on Cisco
SIEMPLIFY
The Art of Recognizing and Surviving SOC Burnout – A complete Manual for Security Operations...
GFCE
Developing Cyber Security as a Profession – A report by the Global Forum on Cyber...
Jon Radoff
The Metaverse Value Chain – The Seven Layers of the Metaverse by Jon Radoff
Americn Public Power A.
Public Power Cyber Incident Response Playbook by American Public Power Association
Splunk
81 Siem Very important Use Cases for your SOC by SPLUNK
IST RANSOM TASKFORCE
Combating Ransomware – A Comprehensive Framework for Action Key Recommendations from the Ransomare Task Force...
CSBS.ORG
CYBERSECURITY 101 – A Resource Guide for Financial Sector Executives by John W. Ryan
ISACA
COBIT ISACA 5 – A Business Framework for the Governance and Management of Enterprise IT
CROWDSTRIKE
CROWDSTRIKE 2022 Global Threat Report by George Kurtz
CLOUD SECURITY ALLIANCE
State of ICS Security in the Age of Cloud by CSA
CHECKPOINT RESEARCH
Checkpoint Cyber Attack Trend 2022 Mid Year Report by Check Point Research
CISA
Chemical Sector Cybersecurity – Framework Implementation Guidance by CISA
Microsoft
Protecting critical Infrastructure against cyber threats – An analysis of relevant regulation, good practices, international...
Codrut Andrei
Cybersecurity Talent Crisis Today and Tomorrow by Codrut Andrei
Kaspersky
Common TTPs of modern ransomware groups by Kaspersky Crimeware
UNG
Civil-Military Cooperation and International Collaboration in CYBER OPERATIONS by UNG.
Chris Davis
Blue Team Cheat Sheets by Chris Davis
NCSC
NCSC Cyber Security for Small Business “SMEs” Guide.
PALADION CYBER DEFENSE
45 SIEM Use Cases for Security Monitoring by Paladion Cyber Defense.
Apress
Jump-start Your SOC Analyst Career – A Roadmap to Cybersecurity Success by Apress
SANS
A SANS 2021 Survey for Security Operations Centers (SOCs)
LetsDefend
SIEM FOR BEGINNERS PREPARED FOR SOC TEAMS BY LETSDEFEND
Joas Antonio
Threat Hunting Introduction by Joas Antonio
Bastian Ballman - Springer
Undestanding Networks Hacks – Attack and Defense with Python 2nd Edition by Bastian Ballman –...
BUTTERWORTH-HEINEMANN
Security Operations Center Guidebook – A Practical Guide for a Successful SOC
CYBEREDGE PRESS
The Threat Intelligence Handbook – A Practical Guide for Security Teams to Unlocking the Power...
World Economic Forum
Building a cyber resilience strategy for a geopolitically unstable world
UK NCSC
NCSC CAF guidance – The Cyber Assessment Framework 3.1
MALTEGO
TOP 13 THREAT INTELLIGENCE PROVIDERS FOR SOC TEAMS BY MALTEGO
UnifiedKillChain.com
The Unified Kill Chain by Paul Pols
HADESS
Attacked From Behind Application using RCE for Exploit Public-Facing Application case study
MALTEGO
HANDBOOK FOR SOCIAL MEDIA INVESTIGATIONS by MALTEGO
HCSC.IN
In Simple: SIM swapping on the rise – Simple Tips on how to avoid being...
US Deparment of Energy
Cibersecurity Capability Maturity Model (C2M2) by US Department of Energy
AT&T Cybersecurity
How to Build a Security Operation Center in Budget by AT&T Cybersecurity
FUTURUM - SPLUNK
How to design your Security Operations Center (SOC) to work smarter, not harder.
Joas Antonio
100 Security Operation Tools for SOCs by Joas Antonio
SANSInstituteSecurity
A SANS 2021 survey – Security operations center
ciso2ciso notepad – checkpoint blog – Deepfakes, Cryptocurrency and Mobile Wallets: Cybercriminals Find New Opportunities...
ciso2ciso notepad – gartner blog – Use the Gartner SOC HIT Model
CISO2CISO Notepad Series
A Guide to DevSecOps Tools and Continuous Security For an Enterprise by Navdeep Sing gill
CISO2CISO Notepad Series
ciso2ciso notepad series – new Released: new MITRE ATT&CK v10
CISO MAG
A day in the life of a modern CISO — You must read…
CISO2CISO Notepad Series
OWASP Top 10 2021 (DRAFT FOR PEER REVIEW) What´s New!!
Think Big Blog
Top 10 TED Talks to Learn about Cyber Security
CISO2CISO Notepad Series
NCSC – Board toolkit: five questions for your board’s agenda
CISO2CISO Notepad Series
C-Level Executives Should Stay Away From These 6 Cybersecurity Myths
MORE RESOURCES
CISO Strategics
cyber operations & soc
red - blue & purple teams
THREAT INTELLIGENCE
VULNERABILITIES
CYBER ATTACKS
DATA BREACH
MALLWARE
RANSOMWARE
DDOS ATTACKS
CLOUD SECURITY
IOT SECURITY
ot security
devsecops
hacking
risk & compliance
governance
data privacy
MORE CISO2CISO RESOURCES LIBRARY TO VIEW
CISO Strategics
SOC OPERATIONS
THREAT INTELLIGENCE
vulnerabilities
cyber attacks
RansoNWARE
DDOS ATTACKS
RED - BLUE & PURPLE
DATA BREACH
DATA PRIVACY
CLOUD SECURITY
IOT - OT SECURITY
RISK & COMPLIANCE
DEVSECOPS